CN106549858A - A kind of instant messaging encryption method based on id password - Google Patents
A kind of instant messaging encryption method based on id password Download PDFInfo
- Publication number
- CN106549858A CN106549858A CN201611123159.8A CN201611123159A CN106549858A CN 106549858 A CN106549858 A CN 106549858A CN 201611123159 A CN201611123159 A CN 201611123159A CN 106549858 A CN106549858 A CN 106549858A
- Authority
- CN
- China
- Prior art keywords
- instant
- instant communication
- communication users
- group
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of instant messaging encryption method based on id password; instant communication users download the corresponding private key of mark from the key generation system of id password system; instant communication users A with identity ID_a realizes security instant communication with the instant communication users B with identity ID_b; both sides are formed in communication process and both knows about the symmetric encipherment algorithm and message consistency protection algorithm that other ignorant master key K use selection, the content of session is encrypted and data consistency protection.The invention has the beneficial effects as follows; when instant communication users A and instant communication users B online communications, both sides have carried out strong identity authentication; do not possess the corresponding private keys of ID_a or ID_b and cannot effectively calculate communications protection key K; so as to be decrypted to the data encrypted, or forge or distort the message by data consistency protection.In offline communications or group communication, no corresponding identity private key cannot decrypt offline or group communication data.
Description
Technical field
The present invention relates to the field of the data safety in data communication, more particularly to protects instant messaging using cryptographic technique
A kind of instant messaging encryption method based on id password of the safety of data.
Background technology
JICQ such as QQ, wechat etc. carry out information transmission using IP Digital Network technologies, considerably reduce logical
The expense of letter.Because of the opening of IP network, this kind of instant messaging faces leaking data, or the risk being tampered, and needs to adopt
Cryptographic technique is protected.
Traditional method, such as QQ, Skype and wechat etc., in traditional IM (Instant Message) system-based, plus
Enter client to the encrypted tunnel of server.But this still suffers from following 3 problems:The independent authentication problem of message, identity it is true
Reality is ensured that by server user is unable to sender's identity of individual authentication message;End end secure communication problem, the service of message Jing
Turn re-encrypted when in device, therefore content does not maintain secrecy to service provider, i.e., be not end end safety.Forward secrecy communication issue,
The session key of QQ and Skype is permanent key, once revealing, will jeopardize all Content of Communication, that is, lack forward secrecy.
The content of the invention
The purpose of the present invention is to carry out letter using IP Digital Network technologies for current JICQ such as QQ, wechat etc.
Breath transmission, considerably reduces the expense of communication.Because of the opening of IP network, this kind of instant messaging faces leaking data, or
The risk being tampered provides a kind of instant messaging encryption method based on id password.
The present invention is to realize that the technical scheme adopted by its purpose is:A kind of instant messaging encryption side based on id password
Method, instant communication users download the corresponding private key of mark from the key generation system of id password system, with identity ID_
The instant communication users A of a realizes security instant communication, including following step with the instant communication users B with identity ID_b
Suddenly;
Whether step A, instant communication users A detection instant communication users B are online, if turning to step B online, otherwise turning
To step C;
Step B01, instant communication users A initiate communication process using the identity of instant communication users B;In IMU
The terminal of credit household A generates random X, according to parameter G that system is selected, calculates R_a=GX;Being calculated using hash function H is included
The summary HASH_a of the first information of R_a, ID_a, ID_b;
Open systematic parameter PP_ of the id password system that step B02, instant communication users A inquiry ID_b marks are located
b;Mark AES encryption R_a and HASH_a is performed using PP_b and ID_b;By the second information data including encrypted result
It is sent to instant communication users B;
After step B03, instant communication users B receive the second information data of instant communication users A transmissions, using ID_b pair
The private key decrypted message answered obtains R_a, HASH_a;
Step B04, instant communication users B verify the legitimacy of HASH_a;If illegal, terminate this communication, it is no
Random number Y is then generated, according to parameter G that system is selected, R_b=G is calculatedY, K is calculated using R_a and R_b;Using hash function H
Calculating includes R_a, the summary HASH_b of the 3rd information of R_b, ID_a, ID_b, K;
Open systematic parameter PP_ of the id password system that step B05, instant communication users B inquiry ID_a marks are located
a;Mark AES encryption R_b and HASH_b is performed using PP_a and ID_a;By the 4th information data including encrypted result
It is sent to instant communication users A;
After step B06, instant communication users A receive the 4th information data of instant communication users B transmissions;Using ID_a pair
The private key decrypted message answered obtains R_b, HASH_b;The legitimacy of verification HASH_b;If illegal, terminate this communication;
R_a and R_b is otherwise utilized to calculate K;
Step B07, K is used when conversating as master key in instant communication users A and instant communication users B, used
The symmetric encipherment algorithm and message consistency protection algorithm of selection, is encrypted to the content of session and data consistency protection;
Instant communication users A and instant communication users B realize secured session, and session finishes end;
Open systematic parameter PP_b of the id password system that step C, instant communication users A inquiry ID_b marks are located;
Mark AES encryption instant message data are performed using PP_b and ID_b..
The invention has the beneficial effects as follows, when instant communication users A and instant communication users B online communications, both sides have been carried out by force
Authentication, i.e., do not possess the corresponding private keys of ID_a or ID_b and cannot effectively calculate communications protection key K, so as to cannot to encryption
Data be decrypted, or forge or distort by data consistency protect message.In offline communications or group communication,
Offline or group communication data cannot be decrypted without corresponding identity private key.
Further, in the above-mentioned instant messaging encryption method based on id password:Utilize in described step B04
It is K=(G that R_a and R_b calculates the formula of KX)Y=GXY;In described step B06, utilize the formula that R_a and R_b calculates K to be K
=(GY)X=GXY。
Further, in the above-mentioned instant messaging encryption method based on id password:In described step B04 and step
The formula that R_a and R_b calculates K is utilized to be K=R_a R_b in B06.
Further, in the above-mentioned instant messaging encryption method based on id password:Second information also includes ID_a,
Mark ID_kgc_a/ID_kgc_b of the id password system that ID_b, ID_a/ID_b are located.4th information also includes ID_a,
Mark ID_kgc_a/ID_kgc_b of the id password system that ID_b, ID_a/ID_b are located.In addition, the described first information,
Also include current time T in second information, the 3rd information, the 4th information.
Further, in the above-mentioned instant messaging encryption method based on id password:The content bag of session in step B07
Include word, voice, file.
The present invention also provides a kind of IMU customer group carries out secured fashion, and technical scheme is:It is a kind of to be based on id password
Instant messaging encryption method, by one group of instant communication users [Xi] the instant communication users group that constitutes, i is natural number, group into
Member XiThere is identity ID_x respectivelyi, it is one unique group identification GP_ of generation when described instant communication users group creates
X, realizes the communication between security instant communication customer group, comprises the following steps;
Step 1, instant communication users group members download the corresponding private of mark from the key generation system of id password system
Key;
Arbitrary IMU user X in step 2, instant communication users groupiObtain corresponding identity private keys GS_ of group identification GP_x
x;
Step 3, in instant communication users group arbitrary IMU user need send instant messages when, all marked using group
Know GP_x encryption session contents, send cipher-text message;
Step 4, private key GS_x decryption of other IMUs user using group identification GP_x in instant communication users group
The cipher-text message for receiving.
Further, it is above-mentioned in the instant messaging encryption method of id password:In step 2, arbitrary IMU user
XiObtaining corresponding identity private keys GS_x of group identification GP_x includes:
IMU user X in step 201, instant communication users groupiInitiate to obtain mark GP_x's to instant way system
Request;
Step 202, instant way system judge IMU user XiWhether instant communication users group GP_x member is belonged to, if
It is to turn to step 203, otherwise terminates;
Step 203, instant way system then generate identity private key GS_x and are sent to IMU user X by the passage of safetyi。
In the step 203, using user X in groupiMark ID_xiX is sent to after encryption group identification private key GS_xi, XiUsing which
Group identification private key is obtained after identity private key decryption.
Further, it is above-mentioned in the instant messaging encryption method of id password:It is arbitrary in instant communication users group to be
Shi Tongyong families XiIf after leaving group, instant communication users group identification is modified to GP'_x by instant way system, what notice was described is
When communication user group in other IMUs user encrypted using new mark GP'_x in group communication, and secure distribution is new again
Group private key GS'_x.
The present invention is described in more detail with specific embodiment below in conjunction with the accompanying drawings.
Description of the drawings
Fig. 1 is two IMU user's online negotiation cipher key processes.
When Fig. 2 is two IMU telex networks, secure communication process when one of them is not online.
Fig. 3 is group key distribution procedure in instant communication users group.
Fig. 4 is group encryption communication process in instant communication users group.
Specific embodiment
Embodiment 1, the present embodiment are a kind of methods that IMU user A and IMU user B carry out secure session.
The purpose of the present embodiment be for face during real-time multimedia communication identity forgery, leaking data, data
Distort the security risk for facing, there is provided a kind of key agreement and data ciphering method of strong identity authentication.
The present embodiment is to illustrate two instant communication users A and B using the system such as QQ of instant messaging, wechat, SKYPE etc.
Secrecy real-time session is carried out, it is known that the user conversated using such instant way system, needs to possess possess calculating
The intelligent mobile terminal or PC terminals of ability, terminal install said system, instant communication users and IMU in explained below
Letter client, the physical aspect of user can be regarded as one intelligent terminal of a personal use and another uses other one
Intelligent terminal is communicated by the Internet, can not be limited as the locus of two people.In practice, instant messaging is used
Made using general phone number during instant messaging or addresses of items of mail, No. QQ, the information with uniqueness such as micro-signal at family
For identity, user carries out the authentication based on mark and key agreement mechanisms are first carried out during online instant messaging, association
Business only has the key that both sides can just calculate, and coordinates data ciphering method to realize data exchange again using the key.
The method comprises the following steps realization:
It is step 1, corresponding in the communication process identity such as instant communication client loading mobile phone number or addresses of items of mail
Identity private key.Instant communication client needs to download the corresponding private key of mark from the key generation system of id password system.This
Process may relate to key generation system certification user and have the identity informations such as corresponding phone number or addresses of items of mail.Mark is close
The key generation system of code system is a kind of " believable from trust authority (Self-Trust Authority, STA).
Situation 1, in the case where communicating pair A and B are online, as shown in Figure 1.
Step 2.1, user A (having identity ID_a) are input into the communications identities of user B using instant communication client
Mark (the such as ID_b such as phone number or addresses of items of mail) initiates communication process;Instant communication client generates random X, according to system
Selected parameter G, calculates R_a=GX;Being calculated using hash function H includes R_a, and ID_a, ID_b and some other correlations are believed
The summary HASH_a of breath.Here parameter G can meet the generation unit in the elliptic curve point group of security requirement, or prime number
Generation unit in the comultiplication group of domain.
The open systematic parameter of the id password system that step 2.2, A side's instant communication client inquiry ID_b marks are located
PP_b;Mark AES encryption R_a and HASH_a is performed using PP_b and ID_b;By encrypted result, and optional ID_a,
The information such as mark ID_kgc_a/ID_kgc_b of id password system that ID_b, ID_a/ID_b are located are sent to B side.
After step 2.3, B side's instant communication client receive the data of step 3, using the corresponding marks of ID_b using decryption
Message obtains R_a, HASH_a;B verifies the legitimacy of HASH_a first;If illegal, terminate this communication, otherwise generate
Random Y, according to parameter G that system is selected, calculates R_b=GY, K=(GX)Y=GXYOr K=R_a R_b;Using hash function
H calculates the summary HASH_b for including R_a, R_b, ID_a, ID_b, K and some other relevant informations.
The open systematic parameter of the id password system that step 2.4, B side's instant communication client inquiry ID_a marks are located
PP_a;Mark AES encryption R_b and HASH_b is performed using PP_a and ID_a;By encrypted result, and optional ID_a,
The information such as mark ID_kgc_a/ID_kgc_b of id password system that ID_b, ID_a/ID_b are located are sent to A side.
After step 2.5, A side's instant communication client receive the message of step 5;Using the corresponding marks of ID_a using decryption
Message obtains R_b, HASH_b;Calculate K=(GY)X=GXYOr K=R_a R_b;The legitimacy of verification HASH_b;If no
It is legal, then terminate this communication.
Step 2.6, using K as key, using key derivation algorithm KDF (such as the KDF1 defined in ISO 18033-2 or
Person KDF2) encryption key and message consistency protection key are derived from from K, using the symmetric encipherment algorithm and message concordance of selection
Protection algorism, is encrypted to communication data and data consistency protection.Protected data can be word, voice, file
Deng.
Situation 2, in the case where recipient B is not online, as shown in Figure 2.
3.1st, open systematic parameter PP_ of the id password system that A side's instant communication client inquiry ID_b marks are located
b;Mark AES encryption instant message data are performed using PP_b and ID_b, data can be word, voice, file etc..
Situation 3, in the case of many people's group communications such as A, B, C:As shown in Figure 4.Here general saying is adopted, under
Face group refers to instant communication users group, and user refers to IMU user.
4.1st, it is all living creatures during group creating into a unique group identification GP_x;
4.2nd, in group, user Z obtains corresponding identity private keys GS_x of mark GP_x;
4.2.1, Z-direction system initiates the request for obtaining mark GP_x
4.2.2, system judges whether Z belongs to crowd GP_x, and Z belongs to crowd GP_x, then generate identity private key GS_x
4.2.3, system is sent to user Z by the scheme of safety.For example using sending after the mark encryption GS_x of Z, Z makes
Key is obtained with its private key decryption;The scheme of safety also have it is a lot, with regard to the present embodiment from the point of view of, due to the id password that we adopt
It is mailbox number, telephone number etc., therefore, instant way system can also be by the way of mail or mobile phone short message to instant messaging
Member in customer group sends identity private key GS_x.
4.3rd, U encrypts instant message using group identification GP_x;
4.4th, private key GS_x decrypting ciphertext message of the Z using group identification GP_x;
If after the 4.5, V leaves group, if it is desired, service system changes group identification to GP'_x, and notifying other use in group
The encryption during group communication of family uses new mark GP'_x, and re-downloads new group private key GS'_x.As shown in Figure 3.
The beneficial effect of the present embodiment is that both sides have carried out strong identity authentication during two people's online communications, i.e., do not possess ID_a
It is or the corresponding private keys of ID_b cannot effectively calculate communications protection key K, so as to be decrypted to the data encrypted or pseudo-
Make or distort the message protected by data consistency.In offline communications or group communication, no corresponding identity private key without
Method decrypts offline or group communication data.
Claims (10)
1. a kind of instant messaging encryption method based on id password, it is characterised in that:Instant communication users are from id password system
The key generation system of system downloads the corresponding private key of mark, the instant communication users A with identity ID_a with there is identity
The instant communication users B of mark ID_b realizes security instant communication, comprises the following steps;
Whether step A, instant communication users A detection instant communication users B are online, if turning to step B online, otherwise turning to step
Rapid C;
Step B01, instant communication users A initiate communication process using the identity of instant communication users B;Use in instant messaging
The terminal of family A generates random X, according to parameter G that system is selected, calculates R_a=GX;Being calculated using hash function H includes R_a,
The summary HASH_a of the first information of ID_a, ID_b;
Open systematic parameter PP_b of the id password system that step B02, instant communication users A inquiry ID_b marks are located;Make
Mark AES encryption R_a and HASH_a is performed with PP_b and ID_b;The second information data including encrypted result is sent
To instant communication users B;
It is after step B03, instant communication users B receive the second information data of instant communication users A transmissions, corresponding using ID_b
Private key decrypted message obtains R_a, HASH_a;
Step B04, instant communication users B verify the legitimacy of HASH_a;If illegal, terminate this communication, otherwise give birth to
Into random number Y, according to parameter G that system is selected, R_b=G is calculatedY, K is calculated using R_a and R_b;Calculated using hash function H
Including R_a, the summary HASH_b of the 3rd information of R_b, ID_a, ID_b, K;
Open systematic parameter PP_a of the id password system that step B05, instant communication users B inquiry ID_a marks are located;Make
Mark AES encryption R_b and HASH_b is performed with PP_a and ID_a;The 4th information data including encrypted result is sent
To instant communication users A;
After step B06, instant communication users A receive the 4th information data of instant communication users B transmissions;It is corresponding using ID_a
Private key decrypted message obtains R_b, HASH_b;The legitimacy of verification HASH_b;If illegal, terminate this communication;Otherwise
K is calculated using R_a and R_b;
Step B07, K is used when conversating as master key in instant communication users A and instant communication users B;Instant messaging
User A and instant communication users B realize secured session, and session finishes end;
Open systematic parameter PP_b of the id password system that step C, instant communication users A inquiry ID_b marks are located;Use
PP_b and ID_b performs mark AES encryption instant message data.
2. the instant messaging encryption method based on id password according to claim 1, it is characterised in that:In described step
The formula that R_a and R_b calculates K is utilized to be K=(G in rapid B04X)Y=GXY;In described step B06, utilize R_a and R_b to count
The formula for calculating K is K=(GY)X=GXY。
3. the instant messaging encryption method based on id password according to claim 1, it is characterised in that:In described step
The formula that R_a and R_b calculates K is utilized to be K=R_a R_b in rapid B04 and step B06.
4. the instant messaging encryption method based on id password according to claim 1 or 2 or 3, it is characterised in that:Second
Information also includes ID_a, ID_b, mark ID_kgc_a/ID_kgc_b of the id password system that ID_a/ID_b is located.
5. the instant messaging encryption method based on id password according to claim 1 or 2 or 3, it is characterised in that:4th
Information also includes ID_a, ID_b, mark ID_kgc_a/ID_kgc_b of the id password system that ID_a/ID_b is located.
6. the instant messaging encryption method based on id password according to claim 1 or 2 or 3, it is characterised in that:Step
In B07, step C, the content of session includes word, voice, file.
7. the instant messaging encryption method based on id password according to claim 4, it is characterised in that:Described first
Also include current time T in information, the second information, the 3rd information, the 4th information.
8. a kind of instant messaging encryption method based on id password, it is characterised in that:By one group of instant communication users [Xi] composition
Instant communication users group, i is natural number, group members XiThere is identity ID_x respectivelyi, described instant communication users group
To generate a unique group identification GP_x during establishment, the communication between security instant communication customer group, including following step are realized
Suddenly;
Step 1, instant communication users group members download the corresponding private key of mark from the key generation system of id password system;
Arbitrary IMU user X in step 2, instant communication users groupiObtain corresponding identity private keys GS_x of group identification GP_x;
Step 3, in instant communication users group arbitrary IMU user need send instant messages when, all using group identification
GP_x encrypts session content, sends cipher-text message;
Step 4, in instant communication users group other IMUs user using group identification GP_x private key GS_x decryption receive
Cipher-text message.
9. the instant messaging encryption method in id password according to claim 8, it is characterised in that:It is in step 2, arbitrary
IMU user XiObtaining corresponding identity private keys GS_x of group identification GP_x includes:
IMU user X in step 201, instant communication users groupiInitiate to obtain the request of mark GP_x to instant way system;
Step 202, instant way system judge IMU user XiWhether instant communication users group GP_x member is belonged to, if turning
To step 203, otherwise terminate;
Step 203, instant way system then generate identity private key GS_x and are sent to IMU user X by the passage of safetyi。
10. according to claim 8 the instant messaging encryption method based on id password, it is characterised in that:Instant messaging is used
Arbitrary IMU user X in the group of familyiIf after leaving group, instant communication users group identification is modified to GP'_x by instant way system,
In notifying described instant communication users group, other IMUs user is encrypted using new mark GP'_x in group communication, is laid equal stress on
The new group private key GS'_x of new secure distribution.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611123159.8A CN106549858B (en) | 2016-12-08 | 2016-12-08 | Instant messaging encryption method based on identification password |
CN201910342724.7A CN110071863A (en) | 2016-12-08 | 2016-12-08 | A kind of instant communication users group's encryption method based on id password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611123159.8A CN106549858B (en) | 2016-12-08 | 2016-12-08 | Instant messaging encryption method based on identification password |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910342724.7A Division CN110071863A (en) | 2016-12-08 | 2016-12-08 | A kind of instant communication users group's encryption method based on id password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106549858A true CN106549858A (en) | 2017-03-29 |
CN106549858B CN106549858B (en) | 2019-12-10 |
Family
ID=58397073
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910342724.7A Pending CN110071863A (en) | 2016-12-08 | 2016-12-08 | A kind of instant communication users group's encryption method based on id password |
CN201611123159.8A Active CN106549858B (en) | 2016-12-08 | 2016-12-08 | Instant messaging encryption method based on identification password |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910342724.7A Pending CN110071863A (en) | 2016-12-08 | 2016-12-08 | A kind of instant communication users group's encryption method based on id password |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN110071863A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106941406A (en) * | 2017-05-02 | 2017-07-11 | 深圳奥联信息安全技术有限公司 | Identify-based encryption endorsement method, decryption sign test method and its device |
CN107135080A (en) * | 2017-07-06 | 2017-09-05 | 深圳奥联信息安全技术有限公司 | SM9 decryption methods and device |
CN107893549A (en) * | 2017-11-09 | 2018-04-10 | 曹睿康 | A kind of building block |
CN108964893A (en) * | 2018-06-26 | 2018-12-07 | 百度在线网络技术(北京)有限公司 | A kind of cipher key processing method, device, equipment and medium |
CN114938358A (en) * | 2022-04-14 | 2022-08-23 | 厦门市美亚柏科信息股份有限公司 | Backup method and terminal for instant messaging application data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662458A (en) * | 2008-08-28 | 2010-03-03 | 西门子(中国)有限公司 | Authentication method |
US20120311329A1 (en) * | 2011-06-03 | 2012-12-06 | Medina Alexander A | System and method for secure instant messaging |
CN105306492A (en) * | 2015-11-25 | 2016-02-03 | 成都三零瑞通移动通信有限公司 | Asynchronous key negotiation method and device aiming at secure instant messaging |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170404B (en) * | 2006-10-24 | 2010-05-19 | 华为技术有限公司 | Method for secret key configuration based on specified group |
CN102196384B (en) * | 2011-05-18 | 2014-08-13 | 陈善真 | Automatic switching system and method based on cellular mobile communication network and Internet protocol (IP) network |
CN105281897A (en) * | 2014-07-22 | 2016-01-27 | 中兴通讯股份有限公司 | File encryption method and device and file decryption method and device |
CN104158653B (en) * | 2014-08-14 | 2017-08-25 | 北京华电天益信息科技有限公司 | A kind of safety communicating method based on the close algorithm of business |
CN104219051B (en) * | 2014-08-20 | 2018-04-13 | 北京奇艺世纪科技有限公司 | The communication means and system of a kind of inner group message |
US9712398B2 (en) * | 2015-01-29 | 2017-07-18 | Blackrock Financial Management, Inc. | Authenticating connections and program identity in a messaging system |
CN104618397B (en) * | 2015-03-04 | 2018-12-28 | 北京深思数盾科技股份有限公司 | A kind of encryption method and encryption system for instant message applications |
CN105025019B (en) * | 2015-07-07 | 2018-09-28 | 深圳奥联信息安全技术有限公司 | A kind of data safety sharing method |
CN105610789B (en) * | 2015-12-18 | 2019-04-30 | 成都三零瑞通移动通信有限公司 | A kind of data ciphering method for chatting instant messaging suitable for more crowds |
-
2016
- 2016-12-08 CN CN201910342724.7A patent/CN110071863A/en active Pending
- 2016-12-08 CN CN201611123159.8A patent/CN106549858B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662458A (en) * | 2008-08-28 | 2010-03-03 | 西门子(中国)有限公司 | Authentication method |
US20120311329A1 (en) * | 2011-06-03 | 2012-12-06 | Medina Alexander A | System and method for secure instant messaging |
CN105306492A (en) * | 2015-11-25 | 2016-02-03 | 成都三零瑞通移动通信有限公司 | Asynchronous key negotiation method and device aiming at secure instant messaging |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106941406A (en) * | 2017-05-02 | 2017-07-11 | 深圳奥联信息安全技术有限公司 | Identify-based encryption endorsement method, decryption sign test method and its device |
CN106941406B (en) * | 2017-05-02 | 2019-11-08 | 深圳奥联信息安全技术有限公司 | Identify-based encryption endorsement method, decryption sign test method and device thereof |
CN107135080A (en) * | 2017-07-06 | 2017-09-05 | 深圳奥联信息安全技术有限公司 | SM9 decryption methods and device |
CN107135080B (en) * | 2017-07-06 | 2019-09-27 | 深圳奥联信息安全技术有限公司 | SM9 decryption method and device |
CN107893549A (en) * | 2017-11-09 | 2018-04-10 | 曹睿康 | A kind of building block |
CN108964893A (en) * | 2018-06-26 | 2018-12-07 | 百度在线网络技术(北京)有限公司 | A kind of cipher key processing method, device, equipment and medium |
CN108964893B (en) * | 2018-06-26 | 2021-11-23 | 百度在线网络技术(北京)有限公司 | Key processing method, device, equipment and medium |
CN114938358A (en) * | 2022-04-14 | 2022-08-23 | 厦门市美亚柏科信息股份有限公司 | Backup method and terminal for instant messaging application data |
CN114938358B (en) * | 2022-04-14 | 2024-02-23 | 厦门市美亚柏科信息股份有限公司 | Backup method and terminal for instant messaging application data |
Also Published As
Publication number | Publication date |
---|---|
CN110071863A (en) | 2019-07-30 |
CN106549858B (en) | 2019-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107888560B (en) | Mail safe transmission system and method for mobile intelligent terminal | |
US8499156B2 (en) | Method for implementing encryption and transmission of information and system thereof | |
CN105323070B (en) | A kind of safety E-mail implementation method based on digital envelope | |
CN110535868A (en) | Data transmission method and system based on Hybrid Encryption algorithm | |
CN108090370B (en) | Instant communication encryption method and system based on index | |
CN101626294A (en) | Certifying method based on identity, method, equipment and system for secure communication | |
CN106549858A (en) | A kind of instant messaging encryption method based on id password | |
EP0755598A1 (en) | Computer network cryptographic key distribution system | |
JPH06350598A (en) | Mutual verification/ciphering key delivery system | |
US9130744B1 (en) | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | |
CN111277412B (en) | Data security sharing system and method based on block chain key distribution | |
CN108011885B (en) | E-mail encryption method and system based on group cryptosystem | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN102547688A (en) | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel | |
CN110120939A (en) | A kind of encryption method and system of the deniable authentication based on heterogeneous system | |
CN105743641B (en) | It is a kind of can explicit authentication public key multi-receiver label decryption method | |
CN109873699A (en) | A kind of voidable identity public key encryption method | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN108833373A (en) | The instant messaging and anonymous access method of facing relation secret protection social networks | |
US11722466B2 (en) | Methods for communicating data utilizing sessionless dynamic encryption | |
CN104200154A (en) | Identity based installation package signing method and identity based installation package signing device | |
CN107483429A (en) | A kind of data ciphering method and device | |
CN112738133A (en) | RSA authentication method | |
US7360238B2 (en) | Method and system for authentication of a user | |
CN106788997B (en) | A kind of real-time multimedia encryption method based on id password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |